Description

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

During infection by this virus, it will attempt to distribute a copy of itself via MAPI email to the first 50 available names in the Outlook address book. After the email routine, this virus modifies the registry with this information:

Aliases

Virus Characteristics

This is a class module macro virus for Word97/2000 documents and templates. This virus may arrive by MAPI email and also contains date activated payloads, one of which attempts to delete *.INI files from the C:\WINDOWS folder.

This virus will rename the first VB Project normally named "ThisDocument" to "Ghauri2" during infection of host files. This virus checks if the global template is infected, if not it runs the MAPI email routine.

This virus may arrive by MAPI email in this format:

Subject = "A Piece of Information From " Infected User NameBody = "Here is some thing about EME College that you better know..."Attachment = infected file

After this virus infects the local user and sends itself via MAPI email, it modifies the registry with this information:

It is very common for macro viruses to disable options within Office applications for example in Word, the macro protection warning commonly is disabled. After cleaning macro viruses, ensure that your previously set options are again enabled.